D:\Git-repo\qb10frame\chrome\src\out\Release_x86\TXBugReport.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2fbbee60e16375b3198e610d3790b7cebe259a7d99f4cfeb33904a2764a2b8fb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2fbbee60e16375b3198e610d3790b7cebe259a7d99f4cfeb33904a2764a2b8fb.exe
Resource
win10v2004-20240802-en
General
-
Target
2fbbee60e16375b3198e610d3790b7cebe259a7d99f4cfeb33904a2764a2b8fb
-
Size
792KB
-
MD5
a2d97a520007fea988c1e0b4aba02be3
-
SHA1
35f35b749f4068ab88140af4a5e30b17f1ddcd6d
-
SHA256
2fbbee60e16375b3198e610d3790b7cebe259a7d99f4cfeb33904a2764a2b8fb
-
SHA512
fd7cbcb485cf6a0574a01fe4a0dc1925b09a2a2b9f428953693fed6dfbd78ba70cb869fbfe662901191e15fad3bc7b3000a168bdbb492531e181624ad9e8155c
-
SSDEEP
24576:UHjEpuZeBdsqlW/r2Rv4T3W5wTma2MceJulTA:M9wv4T3kwTUMHJGTA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fbbee60e16375b3198e610d3790b7cebe259a7d99f4cfeb33904a2764a2b8fb
Files
-
2fbbee60e16375b3198e610d3790b7cebe259a7d99f4cfeb33904a2764a2b8fb.exe windows:6 windows x86 arch:x86
5a434fa02608d035ebcbbd50a37c3350
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
dbghelp
SymGetModuleInfoW
SymInitialize
SymLoadModule
SymSetOptions
SymCleanup
wininet
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetReadFile
InternetCrackUrlA
HttpOpenRequestA
psapi
GetModuleFileNameExA
GetModuleFileNameExW
comctl32
ImageList_Create
ImageList_ReplaceIcon
InitCommonControlsEx
kernel32
CreateEventW
GetLastError
LockResource
HeapReAlloc
CloseHandle
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
Module32FirstW
DecodePointer
HeapDestroy
GetProcAddress
VirtualAllocEx
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
CreateProcessW
GetModuleHandleW
Module32NextW
CreateFileMappingW
MapViewOfFile
GetTickCount
OpenThread
SetUnhandledExceptionFilter
VirtualProtect
InitializeCriticalSectionAndSpinCount
SetCurrentDirectoryW
lstrlenW
GetProcessId
FindClose
WaitForSingleObject
OpenEventW
OpenProcess
MultiByteToWideChar
CreateFileA
SetEvent
lstrcatW
DeleteFileW
LoadLibraryW
CreateThread
GetLocalTime
GetWindowsDirectoryW
VerSetConditionMask
FreeLibrary
CopyFileW
WideCharToMultiByte
VerifyVersionInfoW
IsBadReadPtr
VirtualQueryEx
Sleep
GlobalAlloc
GlobalFree
IsDBCSLeadByte
GlobalLock
lstrcpyW
GlobalUnlock
FindFirstFileW
FindNextFileW
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
ResumeThread
FreeResource
GetFileAttributesW
GetFileSize
Process32NextW
Process32FirstW
WriteFile
CreateDirectoryW
ReadFile
WritePrivateProfileStringW
GetSystemDefaultLCID
GetPrivateProfileIntW
SetFilePointer
GetTempPathW
GetPrivateProfileSectionW
GetThreadSelectorEntry
VirtualFree
HeapSize
SetFileAttributesW
GetSystemTimeAsFileTime
QueryPerformanceCounter
MoveFileW
GetProcessTimes
DeviceIoControl
TerminateThread
GetSystemDefaultLangID
SetLastError
GetSystemDirectoryW
GetSystemInfo
LocalFree
OutputDebugStringW
GetFullPathNameW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
RemoveDirectoryW
MoveFileExW
K32GetMappedFileNameW
LoadLibraryExW
CreateToolhelp32Snapshot
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
EncodePointer
LCMapStringEx
WriteConsoleW
GetStringTypeW
GetCPInfo
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetFilePointerEx
GetFileType
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
FindFirstFileExW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
ExitProcess
GetStdHandle
GetVersionExW
GetCurrentThreadId
CreateFileW
InitializeCriticalSectionEx
SetErrorMode
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
HeapFree
WriteProcessMemory
SizeofResource
InitOnceExecuteOnce
VirtualAlloc
ReadConsoleW
GetConsoleOutputCP
SetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
GetFileSizeEx
GetCurrentDirectoryW
IsValidCodePage
UnmapViewOfFile
GetACP
GetConsoleMode
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
user32
KillTimer
GetSysColorBrush
EnableMenuItem
DrawTextW
InvalidateRect
BeginPaint
EndPaint
EnableWindow
IsWindow
GetWindowThreadProcessId
PostMessageW
TrackPopupMenu
CreatePopupMenu
GetClassInfoExW
RegisterClassExW
CreateWindowExW
DestroyWindow
DefWindowProcW
PostThreadMessageW
SetWindowLongW
MapDialogRect
SetClipboardData
SendDlgItemMessageW
MapWindowPoints
SetDlgItemTextW
EmptyClipboard
CloseClipboard
ClientToScreen
SetTimer
OpenClipboard
GetMenuItemCount
GetDC
GetMenuItemID
GetWindowRect
CallWindowProcW
GetKeyState
GetSystemMenu
RegisterClipboardFormatW
GetWindowTextLengthW
ReleaseDC
DialogBoxParamW
IsWindowVisible
EnumChildWindows
GetGuiResources
EnumWindows
GetClassNameW
GetDesktopWindow
GetParent
GetWindowTextW
MessageBoxW
SetWindowPos
SendMessageW
SetWindowTextW
ShowWindow
LoadIconW
GetClientRect
GetDlgItem
DrawIconEx
LoadImageW
PeekMessageW
DispatchMessageW
GetMessageW
DestroyMenu
GetWindowLongW
EndDialog
gdi32
SetBkMode
SetTextColor
GetStockObject
CreateFontW
SelectObject
DeleteObject
advapi32
RegEnumValueW
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
CloseThreadWaitChainSession
GetThreadWaitChain
OpenThreadWaitChainSession
RegQueryValueExW
GetTokenInformation
AdjustTokenPrivileges
RegQueryInfoKeyW
OpenProcessToken
RegisterWaitChainCOMCallback
LookupPrivilegeValueW
shell32
SHGetDesktopFolder
SHBindToParent
ord155
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
ole32
DoDragDrop
CreateStreamOnHGlobal
OleInitialize
CoInitialize
CoCreateGuid
CoUninitialize
OleUninitialize
oleaut32
SysStringLen
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
shlwapi
PathFindExtensionW
PathRemoveExtensionA
PathRemoveExtensionW
PathFindFileNameA
SHGetValueA
PathAppendW
PathFileExistsW
SHGetValueW
StrRStrIA
StrTrimA
PathCombineW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
gdiplus
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipGetImageWidth
GdipDeleteGraphics
GdipCreateFromHDC
GdipFree
GdipImageGetFrameDimensionsCount
GdipGetPropertyItem
GdipDisposeImage
GdipDrawImageRectI
GdipGetImageHeight
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipLoadImageFromStreamICM
GdipCloneImage
ws2_32
htonl
htons
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
dbgeng
DebugCreate
crypt32
CertGetNameStringW
wintrust
WTHelperGetProvCertFromChain
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
netapi32
Netbios
NetApiBufferFree
NetWkstaTransportEnum
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
Sections
.text Size: 548KB - Virtual size: 548KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ